DanderSpritz: How the Equation Group's 2013 tools pwn in 2017

DerbyCon 7.0 - Legacy

Presented by: Francisco Donoso
Date: Friday September 22, 2017
Time: 17:00 - 17:55
Location: Track 3 - Teach Me

Everyone has focused on the Equation Group's ""weapons grade"" exploits but no one has focused on their extremely effective post exploitation capabilities.

In this talk I will cover the tools, methods, and capabilities built into the DanderSpritz post exploitation framework. We will review how the Equation Group gained and maintained persistence, bypassed auditing and AV, scan, sampled, subdued, and successfully dominated an entire organization ninja-style.

We'll dig into the technical details of how the framework gains persistence, performs key logging, captures traffic and screenshots, steals credentials, gathers target information, owns AV and WSUS servers, exfiltrates secrets, and causes general mayhem.

Francisco Donoso

Francisco has knee-deep in many facets of security. From Network Security Analysis and Engineering, to security consulting for some of the world's most valuable companies, bringing along a marriage of DevOps and Security along the way. Francisco is now focused on leading a team developing Managed Security Services at a Swiss based security organization. @Francisckrs


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats